Skip to content
  • Home
  • Cyberattacks
  • Threats
  • Strategy
  • Breaches
  • Vulnerability
  • Leadership and careers
  • Regulation
27 Jan, 2023
Latest News:
F.B.I. Investigates Cyberattack That Targeted N.Y.C. Law Department
Hackers Attack Airlines with New RAT Downloader
Berlin security service blames Iran for cyberattack on German companies

  • Home
  • Cyberattacks
  • Threats
  • Strategy
  • Breaches
  • Vulnerability
  • Leadership and careers
  • Regulation
  • Home
  • Blog
  • uncategorized

Category: uncategorized

Ministry Industry Trade ordered study processors imitating work brain

The Ministry of Industry and Trade ordered a study of processors imitating the work of the brain

16/07/202101/08/2021

The Ministry announced a tender with an initial contract price of 70 million rubles. The Ministry of Industry and Trade Read more

uncategorized
European consumer organization complained about WhatsApp's privacy policy

European consumer organization complained about WhatsApp’s privacy policy

13/07/202128/07/2021

Facebook officials believe critics of the change have misunderstood the situation. Tech giant Facebook’s WhatsApp messenger has faced a flurry Read more

News, uncategorized
The network leaked database personal data clients "Eyes of God"

The network leaked a database of personal data of clients “Eyes of God”

13/07/202128/07/2021

The database contains 774 thousand lines and is described as the “eyes of God” customer base Yesterday evening, a database Read more

uncategorized
The network leaked database personal data clients "Eyes of God"

The creator of the “Eyes of God” accused Telegram of leaking data

12/07/202128/07/2021

Yevgeny Antipov is going to create his own messenger, “lure a crowd of people there” and “merge” compromising evidence on Read more

News, uncategorized
  • Popular
  • Recent
  • Comments
  • Attackers are already using Log4Shell to install malware and miners

    Attackers are already using Log4Shell to install malware and miners

    13/12/2021
  • The court will consider Epic Games’ antitrust lawsuit against Apple

    The court will consider Epic Games’ antitrust lawsuit against Apple

    04/05/2021
  • Hackers attack cryptocurrency users through Tor servers

    Hackers attack cryptocurrency users through Tor servers

    10/05/2021
  • Germany bans FaceBook from collecting data from WhatsApp users

    Germany bans FaceBook from collecting data from WhatsApp users

    11/05/2021
  • Apple reports on the fight against fraud in 2020

    Apple reports on the fight against fraud in 2020

    11/05/2021
  • Attackers are already using Log4Shell to install malware and miners

    Attackers are already using Log4Shell to install malware and miners

    13/12/2021
  • Snatch hacked Volvo Cars and stole company documents

    Snatch hacked Volvo Cars and stole company documents

    12/12/2021
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

    Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

    11/12/2021
  • Phishers exploit OAuth holes in Microsoft and Google implementations

    Phishers exploit OAuth holes in Microsoft and Google implementations

    10/12/2021
  • The authors of the ransomware Cuba “earned” $ 44 million

    The authors of the ransomware Cuba “earned” $ 44 million

    07/12/2021

Categories

  • Breaches
  • Cyberattacks
  • Latest
  • News
  • Threats
  • uncategorized

Recent Posts

  • Attackers are already using Log4Shell to install malware and miners
  • Snatch hacked Volvo Cars and stole company documents
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers
  • Phishers exploit OAuth holes in Microsoft and Google implementations
  • The authors of the ransomware Cuba “earned” $ 44 million

Popular Posts

Attackers already using Log4Shell install malware miners

Attackers are already using Log4Shell to install malware and miners

13 Dec 2021
Snatch hacked Volvo Cars and stole company documents

Snatch hacked Volvo Cars and stole company documents

12 Dec 2021
Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

11 Dec 2021
Phishers exploit OAuth holes Microsoft Google implementations

Phishers exploit OAuth holes in Microsoft and Google implementations

10 Dec 2021

Recent Posts

  • Attackers are already using Log4Shell to install malware and miners
  • Snatch hacked Volvo Cars and stole company documents
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers
  • Phishers exploit OAuth holes in Microsoft and Google implementations

Categories

  • Breaches
  • Cyberattacks
  • Latest
  • News
  • Threats
  • uncategorized

Facebook

Facebook

Popular Posts

Attackers are already using Log4Shell to install malware and miners

13 Dec 2021

Snatch hacked Volvo Cars and stole company documents

12 Dec 2021
Copyright © 2023 . All rights reserved.
 

Loading Comments...